Author of the publication

An Empirical Examination of an Agile Contingent Project/Method Fit Model.

, , , and . Commun. Assoc. Inf. Syst., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Efficacy in Software Developers: A Framework for the Study of the Dynamics of Human Cognitive Empowerment., , and . IJITSA, 2 (2): 34-49 (2009)Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets., , , and . CoRR, (2023)Knowledge Location, Differentiation, Credibility and Coordination in Open Source Software Development Teams., and . AMCIS, page 389. Association for Information Systems, (2009)An Empirical Examination of an Agile Contingent Project/Method Fit Model., , , and . Commun. Assoc. Inf. Syst., (2016)Security Operations Centers: A Holistic View on Problems and Solutions., and . HICSS, page 1-10. ScholarSpace, (2022)Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics., , and . HICSS, page 1-2. ScholarSpace, (2022)Method to Identify High Value Assets for Small Government Agencies and Small to Mid-sized Organizations., and . HICSS, page 1-10. ScholarSpace, (2022)Development of a Framework for Analyzing Individual and Environmental Factors Preceding Attitude toward Information Security., and . AMCIS, page 178. Association for Information Systems, (2007)An Exploratory Analysis in Android Malware Trends., and . AMCIS, Association for Information Systems, (2016)Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies., and . AMCIS, Association for Information Systems, (2016)